Soumettre la recherche
Mettre en ligne
4. florence dupre new usagesprivacy legal framework fd
•
Télécharger en tant que PPT, PDF
•
0 j'aime
•
999 vues
G
GlobalForum
Suivre
Signaler
Partager
Signaler
Partager
1 sur 6
Télécharger maintenant
Recommandé
Ecommerce Chap 10
Ecommerce Chap 10
Pimsat University
MindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no cover
PJStarr
Cyber law - Security aspects and Intellectual Property rights
Cyber law - Security aspects and Intellectual Property rights
premarhea
Privacy and personal information
Privacy and personal information
Uc Man
Information Privacy
Information Privacy
primeteacher32
Ss
Ss
DukeLss
The Case for Personal Information Empowerment and the rise of personal data s...
The Case for Personal Information Empowerment and the rise of personal data s...
Mydex CIC
Cyber laws - Ritu Gautam
Cyber laws - Ritu Gautam
Ritu Gautam
Recommandé
Ecommerce Chap 10
Ecommerce Chap 10
Pimsat University
MindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no cover
PJStarr
Cyber law - Security aspects and Intellectual Property rights
Cyber law - Security aspects and Intellectual Property rights
premarhea
Privacy and personal information
Privacy and personal information
Uc Man
Information Privacy
Information Privacy
primeteacher32
Ss
Ss
DukeLss
The Case for Personal Information Empowerment and the rise of personal data s...
The Case for Personal Information Empowerment and the rise of personal data s...
Mydex CIC
Cyber laws - Ritu Gautam
Cyber laws - Ritu Gautam
Ritu Gautam
Overview of Ethical Issues in Digital Watermarking
Overview of Ethical Issues in Digital Watermarking
Dr. Michael Agbaje
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
Jim Brashear
2 7-2013-big data and e-discovery
2 7-2013-big data and e-discovery
Exterro
Cloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association Presentation
Nicole Black
Introducing the Information Technology Act [Scriboard]
Introducing the Information Technology Act [Scriboard]
Rodney D. Ryder
Information Explosion - Erik Moller
Information Explosion - Erik Moller
HPDutchWorld
Boulder/Denver Software Club Presentation: "All Things Data - Data Right...
Boulder/Denver Software Club Presentation: "All Things Data - Data Right...
Jason Haislmaier
Stallings ch18 privacy
Stallings ch18 privacy
salehnia
Federal Data Protection Act (FDPA)
Federal Data Protection Act (FDPA)
AMIPCI
Introduction to Cyber Crimes
Introduction to Cyber Crimes
atuljaybhaye
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
Laguna State Polytechnic University
Conference Cyber law Bali
Conference Cyber law Bali
MartenLinkedin
Review questions
Review questions
Anura Kumara
Compliance & Value of Digital Signatures
Compliance & Value of Digital Signatures
Strategic Business & IT Services
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Grid
bradley_g
ACT OCN - Unit Titles Law - What's New, What's Next, What Now?
ACT OCN - Unit Titles Law - What's New, What's Next, What Now?
TEYS Lawyers
Privacy presentation for regional directors july 2009
Privacy presentation for regional directors july 2009
brentcarey
Privacy by design for startups: legal and technology
Privacy by design for startups: legal and technology
Ishay Tentser
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
ICT Watch
Privacy and E-Commerce
Privacy and E-Commerce
Aleksandr Yampolskiy
Web annika branstrom global forum nov2012long
Web annika branstrom global forum nov2012long
GlobalForum
3. w.cellary privacy stockholm_v5
3. w.cellary privacy stockholm_v5
GlobalForum
Contenu connexe
Tendances
Overview of Ethical Issues in Digital Watermarking
Overview of Ethical Issues in Digital Watermarking
Dr. Michael Agbaje
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
Jim Brashear
2 7-2013-big data and e-discovery
2 7-2013-big data and e-discovery
Exterro
Cloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association Presentation
Nicole Black
Introducing the Information Technology Act [Scriboard]
Introducing the Information Technology Act [Scriboard]
Rodney D. Ryder
Information Explosion - Erik Moller
Information Explosion - Erik Moller
HPDutchWorld
Boulder/Denver Software Club Presentation: "All Things Data - Data Right...
Boulder/Denver Software Club Presentation: "All Things Data - Data Right...
Jason Haislmaier
Stallings ch18 privacy
Stallings ch18 privacy
salehnia
Federal Data Protection Act (FDPA)
Federal Data Protection Act (FDPA)
AMIPCI
Introduction to Cyber Crimes
Introduction to Cyber Crimes
atuljaybhaye
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
Laguna State Polytechnic University
Conference Cyber law Bali
Conference Cyber law Bali
MartenLinkedin
Review questions
Review questions
Anura Kumara
Compliance & Value of Digital Signatures
Compliance & Value of Digital Signatures
Strategic Business & IT Services
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Grid
bradley_g
ACT OCN - Unit Titles Law - What's New, What's Next, What Now?
ACT OCN - Unit Titles Law - What's New, What's Next, What Now?
TEYS Lawyers
Privacy presentation for regional directors july 2009
Privacy presentation for regional directors july 2009
brentcarey
Privacy by design for startups: legal and technology
Privacy by design for startups: legal and technology
Ishay Tentser
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
ICT Watch
Privacy and E-Commerce
Privacy and E-Commerce
Aleksandr Yampolskiy
Tendances
(20)
Overview of Ethical Issues in Digital Watermarking
Overview of Ethical Issues in Digital Watermarking
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
2 7-2013-big data and e-discovery
2 7-2013-big data and e-discovery
Cloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association Presentation
Introducing the Information Technology Act [Scriboard]
Introducing the Information Technology Act [Scriboard]
Information Explosion - Erik Moller
Information Explosion - Erik Moller
Boulder/Denver Software Club Presentation: "All Things Data - Data Right...
Boulder/Denver Software Club Presentation: "All Things Data - Data Right...
Stallings ch18 privacy
Stallings ch18 privacy
Federal Data Protection Act (FDPA)
Federal Data Protection Act (FDPA)
Introduction to Cyber Crimes
Introduction to Cyber Crimes
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
Conference Cyber law Bali
Conference Cyber law Bali
Review questions
Review questions
Compliance & Value of Digital Signatures
Compliance & Value of Digital Signatures
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Grid
ACT OCN - Unit Titles Law - What's New, What's Next, What Now?
ACT OCN - Unit Titles Law - What's New, What's Next, What Now?
Privacy presentation for regional directors july 2009
Privacy presentation for regional directors july 2009
Privacy by design for startups: legal and technology
Privacy by design for startups: legal and technology
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
Privacy and E-Commerce
Privacy and E-Commerce
En vedette
Web annika branstrom global forum nov2012long
Web annika branstrom global forum nov2012long
GlobalForum
3. w.cellary privacy stockholm_v5
3. w.cellary privacy stockholm_v5
GlobalForum
Ppt shark global forum session 3 2012 v4
Ppt shark global forum session 3 2012 v4
GlobalForum
Steven adler ibm big data predictions
Steven adler ibm big data predictions
GlobalForum
Latif ladid gen6 overview
Latif ladid gen6 overview
GlobalForum
Web samia mehlem open data and wb main presentation
Web samia mehlem open data and wb main presentation
GlobalForum
5. global forum sg grumbach
5. global forum sg grumbach
GlobalForum
2 ppt final dan shoemaker dd1 stockholm presentation
2 ppt final dan shoemaker dd1 stockholm presentation
GlobalForum
20121112 global forum_ntt_niwano_fin
20121112 global forum_ntt_niwano_fin
GlobalForum
Global forum 2012 pascal poitevin v2
Global forum 2012 pascal poitevin v2
GlobalForum
En vedette
(10)
Web annika branstrom global forum nov2012long
Web annika branstrom global forum nov2012long
3. w.cellary privacy stockholm_v5
3. w.cellary privacy stockholm_v5
Ppt shark global forum session 3 2012 v4
Ppt shark global forum session 3 2012 v4
Steven adler ibm big data predictions
Steven adler ibm big data predictions
Latif ladid gen6 overview
Latif ladid gen6 overview
Web samia mehlem open data and wb main presentation
Web samia mehlem open data and wb main presentation
5. global forum sg grumbach
5. global forum sg grumbach
2 ppt final dan shoemaker dd1 stockholm presentation
2 ppt final dan shoemaker dd1 stockholm presentation
20121112 global forum_ntt_niwano_fin
20121112 global forum_ntt_niwano_fin
Global forum 2012 pascal poitevin v2
Global forum 2012 pascal poitevin v2
Similaire à 4. florence dupre new usagesprivacy legal framework fd
Presentation on Information Privacy
Presentation on Information Privacy
Perry Slack
idigf - hukum - ui - edmon makarim
idigf - hukum - ui - edmon makarim
IGF Indonesia
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Symantec APJ
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Alan McSweeney
UNIT V.pptx
UNIT V.pptx
RAMESHMRA21130030110
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
Symantec APJ
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
Mydex CIC
Ley protección de datos personales
Ley protección de datos personales
Juan Carlos Carrillo
The Data Protection Act
The Data Protection Act
burto111
Privacy icms (handouts)
Privacy icms (handouts)
brentcarey
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
2011 hildebrandt institute cio forum data privacy and security presentation...
2011 hildebrandt institute cio forum data privacy and security presentation...
David Cunningham
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
SecureCurve
Personal Data Protection Law
Personal Data Protection Law
Hatice Zümbül, LL.M.
ETHICS IN CYBERSPACE.pptx Digital Empowerment
ETHICS IN CYBERSPACE.pptx Digital Empowerment
nellykelly1663
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal Threats
Abbie Hosta
Cyber crime
Cyber crime
Ranjan Som
Ethics and Politics of Big Data
Ethics and Politics of Big Data
robkitchin
28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteit
Stichting ePortfolio Support
Privacy and data protection primer - City of Portland
Privacy and data protection primer - City of Portland
Hector Dominguez
Similaire à 4. florence dupre new usagesprivacy legal framework fd
(20)
Presentation on Information Privacy
Presentation on Information Privacy
idigf - hukum - ui - edmon makarim
idigf - hukum - ui - edmon makarim
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
UNIT V.pptx
UNIT V.pptx
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
Ley protección de datos personales
Ley protección de datos personales
The Data Protection Act
The Data Protection Act
Privacy icms (handouts)
Privacy icms (handouts)
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
2011 hildebrandt institute cio forum data privacy and security presentation...
2011 hildebrandt institute cio forum data privacy and security presentation...
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
Personal Data Protection Law
Personal Data Protection Law
ETHICS IN CYBERSPACE.pptx Digital Empowerment
ETHICS IN CYBERSPACE.pptx Digital Empowerment
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal Threats
Cyber crime
Cyber crime
Ethics and Politics of Big Data
Ethics and Politics of Big Data
28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteit
Privacy and data protection primer - City of Portland
Privacy and data protection primer - City of Portland
Plus de GlobalForum
7. brigitte d'heygere
7. brigitte d'heygere
GlobalForum
Corporate urban f presentation europe
Corporate urban f presentation europe
GlobalForum
7 ppt thunus global forum
7 ppt thunus global forum
GlobalForum
6 ppt hoddevik short final
6 ppt hoddevik short final
GlobalForum
5 ppt johannes wimmer global forum session_6_bbg
5 ppt johannes wimmer global forum session_6_bbg
GlobalForum
4 ppt myeongki baek
4 ppt myeongki baek
GlobalForum
3 ppt eleanor stewart global forum stockholm es
3 ppt eleanor stewart global forum stockholm es
GlobalForum
Wormeli
Wormeli
GlobalForum
Wormeli global forum 2012
Wormeli global forum 2012
GlobalForum
12 11-11 global forum sto thomas myrup kristensen facebook
12 11-11 global forum sto thomas myrup kristensen facebook
GlobalForum
2. 2012 11-11 global forum sto thomas myrup kristensen facebook
2. 2012 11-11 global forum sto thomas myrup kristensen facebook
GlobalForum
Ppt samia mehlem global forum samia m session 3
Ppt samia mehlem global forum samia m session 3
GlobalForum
Annika branstrom short global forum nov.2012
Annika branstrom short global forum nov.2012
GlobalForum
1 ppt h lindskog rev
1 ppt h lindskog rev
GlobalForum
Global Forum 2012: Francisco Garcia Moran
Global Forum 2012: Francisco Garcia Moran
GlobalForum
Global forum 2012: Gaetano Santucci
Global forum 2012: Gaetano Santucci
GlobalForum
Global Forum 2012 Presentation: Nesar Maroof, Bahrain Government Authority
Global Forum 2012 Presentation: Nesar Maroof, Bahrain Government Authority
GlobalForum
Global Forum 2012 Presentation: Amadou Daffe, Code4Africa on Platforms to Gr...
Global Forum 2012 Presentation: Amadou Daffe, Code4Africa on Platforms to Gr...
GlobalForum
Global Forum 2012 Presentation: Luis Rodriguez-Rosello, DG CONNECT
Global Forum 2012 Presentation: Luis Rodriguez-Rosello, DG CONNECT
GlobalForum
Global Forum 2012: Christine Leurquin, ESOA
Global Forum 2012: Christine Leurquin, ESOA
GlobalForum
Plus de GlobalForum
(20)
7. brigitte d'heygere
7. brigitte d'heygere
Corporate urban f presentation europe
Corporate urban f presentation europe
7 ppt thunus global forum
7 ppt thunus global forum
6 ppt hoddevik short final
6 ppt hoddevik short final
5 ppt johannes wimmer global forum session_6_bbg
5 ppt johannes wimmer global forum session_6_bbg
4 ppt myeongki baek
4 ppt myeongki baek
3 ppt eleanor stewart global forum stockholm es
3 ppt eleanor stewart global forum stockholm es
Wormeli
Wormeli
Wormeli global forum 2012
Wormeli global forum 2012
12 11-11 global forum sto thomas myrup kristensen facebook
12 11-11 global forum sto thomas myrup kristensen facebook
2. 2012 11-11 global forum sto thomas myrup kristensen facebook
2. 2012 11-11 global forum sto thomas myrup kristensen facebook
Ppt samia mehlem global forum samia m session 3
Ppt samia mehlem global forum samia m session 3
Annika branstrom short global forum nov.2012
Annika branstrom short global forum nov.2012
1 ppt h lindskog rev
1 ppt h lindskog rev
Global Forum 2012: Francisco Garcia Moran
Global Forum 2012: Francisco Garcia Moran
Global forum 2012: Gaetano Santucci
Global forum 2012: Gaetano Santucci
Global Forum 2012 Presentation: Nesar Maroof, Bahrain Government Authority
Global Forum 2012 Presentation: Nesar Maroof, Bahrain Government Authority
Global Forum 2012 Presentation: Amadou Daffe, Code4Africa on Platforms to Gr...
Global Forum 2012 Presentation: Amadou Daffe, Code4Africa on Platforms to Gr...
Global Forum 2012 Presentation: Luis Rodriguez-Rosello, DG CONNECT
Global Forum 2012 Presentation: Luis Rodriguez-Rosello, DG CONNECT
Global Forum 2012: Christine Leurquin, ESOA
Global Forum 2012: Christine Leurquin, ESOA
4. florence dupre new usagesprivacy legal framework fd
1.
The legal framework Florence
DUPRE Global Forum November 2012
2.
AGENDA •
Introduction • Limits of the legal framework • What’s new? • The way forward? Perspectives? Title / Name © 2012 CASSIDIAN CYBERSECURITY - All rights reserved Date Page 2
3.
LIMITS OF THE
CURRENT LEGAL FRAMEWORK Geographic issue Concept of Lack of sovereignty & interoperability territoriality Security/privacy: Fast evolving different interests technology different approach Data protection Data breach Lack of Data & identity theft Cyber crime Applicable law harmonization Cybersecurity & Jurisdiction? => compliance issue Liability ? Investigation Legal answser is & Evidence/ difficult prosecution Data protection The Budapest & privacy convention laws & Regulations on Cybercrime? Data retention laws Title / Name & Regulations © 2012 CASSIDIAN CYBERSECURITY - All rights reserved Date Page 3
4.
WHAT’S NEW?
• Combination of technical & legal solutions • Privacy by Design design data processing devices so as to best comply with data protection requirements • Privacy Enhancing Technologies refers to “coherent systems of information and communication technologies that strengthen the protection of privacy in information systems by preventing the unnecessary or unlawful collection, use and disclosure of personal data, or by offering tools to enhance an individual’s control over his/her data”. • Identity federation • Electronic identity ==>e-ID • Data & Identity theft Crime in which someone illegaly/fraudulently obtains and uses another person’s personal data • Digital signature • Forensics & Digital evidence • Social media (Facebook, Twitter…) • Legal Ethics & Best practices • Trust & confidence • BYOD ==> security & privacy concerns • Mobility & Cloud computing • Cybersecurity/Cybercrime/Cyberwar Title / Name © 2012 CASSIDIAN CYBERSECURITY - All rights reserved Date Page 4
5.
THE WAY FORWARD?
/ PERSPECTIVES? • Need to adapt the existing legal framework to the technology and the threats • Update of the existing cybercrime convention: most of the players agree that what is required is to further detail the existing legislation by complementing it with additional rules imposing specific technical safeguards against new risks • Need for an harmonized and interoperable legal framework at EU & International level – Use the results of Working groups/initiatives ==> International Telecommunication Union (2007) ==> Other United Nations initiatives • Extend some existing obligations to other actors ==> security breach notification • Development of best practices • A specific International criminal court for cyberspace should be established • International treaty == > Cyber attacks of the most serious global concern should be included in a substantive international criminal law International legal cooperation & harmonization is key for an efficient & global legal answer Title / Name © 2012 CASSIDIAN CYBERSECURITY - All rights reserved Date Page 5
6.
Thank you for
your attention! The reproduction, distribution and utilization of this document as well as the communication of its contents to others without express authorization is prohibited. Offenders will be held liable for the payment of damages. All rights reserved in the event of the grant of a patent, utility model or design. Title / Name © 2012 CASSIDIAN CYBERSECURITY - All rights reserved Date Page 6
Télécharger maintenant